Professional Documents
Culture Documents
net/publication/329970515
CITATIONS READS
0 877
2 authors, including:
Aditya Gupta
Baba Ghulam Shah Badshah University
6 PUBLICATIONS 3 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Aditya Gupta on 28 December 2018.
ABSTRACT
Blockchain, the distributed ledger technology has revolutionized the world of online transactions globally. It
has various other uses but the most prominent one is the purpose of it serving as an underlying technology for
the most popular and successful cryptocurrencies to this date known as the bitcoin. In this paper, we shall
discuss about how the bitcoin, blockchain and the cryptocurrencies are integrated with each other and how
they complement each other in order to make the online transaction phenomenon more friendly, accurate
and efficient. We also review various security vectors and solutions that come across while deploying these
techniques. The future possibilities and exploring probabilities of the three aspects is also very briefly
discussed in this paper.
Keywords: Bitcoin, Cryptocurrency, Blockchain, Security Vectors.
B. Hot wallet
These wallets run on internet connected devices.
These wallet generate private key on internet which
makes them more secure. They can store small
amount of bitcoins, these are convenient i.e. B. Brute force attack
receiving and spending payments are easy and fast. Brute force attack is also an attack which considers
These are not good for storing secure large amount of the blunder of double spending. It is done by
bitcoins. The following table shows different kinds of privately mining the blockchain fork [10]. This also
wallet [3].
is primarily targeted at merchants and sellers. The
counter measuring to this attack can be done by
III. ATTACKS
confirming the transactions repeatedly.
III. CONCLUSION
IV.REFERENCES